Quarantine Settings and Attack Remediation

Define what happens to the components of an attack that is detected by Forensics. When files are quarantined, they are deleted and put in a secure location from which they can be restored, if necessary.

The automatic options are:

  • Quarantine all attack elements - All components of the attack are quarantined.

  • Quarantine only files with known malicious reputation - If a file is not known as malicious, it is not quarantined.

You can manually edit the treatment for each category of file: Malicious, suspicious, or unknown. For each category, you can select:

  • Quarantine - Files are deleted and put in a secure location from which they can be restored, if necessary.

  • Delete - Files are permanently deleted.

  • Backup - Delete the file and create an accessible duplicate.

  • None - No action is taken.

Trusted Files are those defined as trusted by the Check Point Reputation Service. The remediation options for Trusted Files are:

  • Terminate - Stop the suspicious process.

  • Ignore - Do not terminate processes. Activity is monitored.